2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC) 2017
DOI: 10.1109/icbdaci.2017.8070868
|View full text |Cite
|
Sign up to set email alerts
|

Study on encryption methods to secure the privacy of the data and computation on encrypted data present at cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Research Findings Qiu, Lu, & Lin (2019) Analysis of cryptography using fuzzy method Guo et al (2019) Efficiency during connection through node to node by applying blockchain Lou et al (2018) Blockchain application in trust model NDN (Named Data Networking) Dave et al (2019) Wide application by using blockchain, but less implementation because of some disadvantages Preece & Easton (2018) Virtual machine modification inside blockchain programming language Alharby, Aldweesh, & Moorsel (2018) Smart contract blockchain for every sector Zhang et al (2019) Data security to deal with blockhain widely Wang, Tian, & Zhu (2018) Data encryption to ensure the authenticity of data on the blockchain network Holtkemper & Wieninger (2018) Types of company data to be stored in a blockchain network Nagesh & Thejaswini (2017) Data security by using AES Algorithm Bak, Pyo, & Jeong (2019) Data encryption with EGG integrity blockchain Yi (2019) Machine learning algorithm and blockchain encryption for instant message…”
Section: Authormentioning
confidence: 99%
“…Research Findings Qiu, Lu, & Lin (2019) Analysis of cryptography using fuzzy method Guo et al (2019) Efficiency during connection through node to node by applying blockchain Lou et al (2018) Blockchain application in trust model NDN (Named Data Networking) Dave et al (2019) Wide application by using blockchain, but less implementation because of some disadvantages Preece & Easton (2018) Virtual machine modification inside blockchain programming language Alharby, Aldweesh, & Moorsel (2018) Smart contract blockchain for every sector Zhang et al (2019) Data security to deal with blockhain widely Wang, Tian, & Zhu (2018) Data encryption to ensure the authenticity of data on the blockchain network Holtkemper & Wieninger (2018) Types of company data to be stored in a blockchain network Nagesh & Thejaswini (2017) Data security by using AES Algorithm Bak, Pyo, & Jeong (2019) Data encryption with EGG integrity blockchain Yi (2019) Machine learning algorithm and blockchain encryption for instant message…”
Section: Authormentioning
confidence: 99%
“…These risks can be minimized by implementing adequate data encryption techniques [28] which are already very popular and are used for privacy of medical data, genetic, and insurance data. Private data of users can be protected against decryption of data to expose their identity.…”
Section: B User Data Encryptionmentioning
confidence: 99%
“…therefore the security of this information has become an essential necessity to preserve the authenticity and confidentiality of the messages transmitted and to avoid the intrusion of unauthorized persons, the technique ensuring this protection is called cryptography. Several encryption methods have been developed to solve the security problem (Nagesh & Thejaswini, 2017). They can be classified according to key types into two main families: symmetric and asymmetric cryptography.…”
Section: Introductionmentioning
confidence: 99%